Chip Security TestingΒ 
Binary Security AnalysisΒ 
ResourcesΒ 
Blog
Contact us
eShard
/
escoaching
/
Static Analysis IOS Part 2
Intermediate

Static Analysis of an iOS application, Part 2

This module is the 2nd part of the series related to Static Analysis of an iOS application.

This time the focus is put on understanding how to figure out the inner workings of an iOS application depending on what APIs are being used (e.g APIs related to Cryptography, Keychain, File manipulation, etc.) and also what kind of framework is being used (e.g UIKit, SwiftUI, SpriteKit, RealityKit, etc.).

Covered Topics

What you will learn:

  • Finding relevant entry points from where to start the exploration.
  • Information gathering.
  • Figuring out the inner workings of the application under analysis

Exercises

A CrackMe-like challenge is provided as a practical exercise.

Different flags have to be found with only one condition: you have to only perform static analysis to reverse engineer the application and retrieve those flags.

You will have to extract and decompile or disassemble the code to review it.

You will have to apply the tips that were provided while using IDA Pro with Hex-Rays decompiler.

Requirements

  • MacOS
  • Jailbroken iPhone on iOS 13 and above
  • Xcode and the developer tools
  • An ARM disassembler like IDA (+Hex-Rays decompiler), or Ghidra
  • Basic understanding of the Objective-C and Swift programming languages
  • Basic understanding of the AARCH64 assembly language. (If beginner level, the module related to ARM is required)
Contact us

Practical information

Overall duration: 5 to 10 days

Schedule: 9:30am - 1pm (CET/CEST) - virtual/in person

Number of trainees: 2 trainees max.

Our Coaches

Yoan
Lefevre
Tiana
Razafindralambo
CopyRights eShard 2024.
All rights reserved
Privacy policy | Legal Notice